UbuntuUpdates.org

Package "linux-aws"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-aws

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 4.4.0
  • Header files related to Linux kernel version 4.4.0
  • Header files related to Linux kernel version 4.4.0
  • Header files related to Linux kernel version 4.4.0

Latest version: 4.4.0-1095.106
Release: xenial (16.04)
Level: base
Repository: main

Links

Save this URL for the latest version of "linux-aws": https://www.ubuntuupdates.org/linux-aws



Other versions of "linux-aws" in Xenial

Repository Area Version
security universe 4.4.0-1012.21
security main 4.4.0-1094.105
updates universe 4.4.0-1012.21
updates main 4.4.0-1094.105
proposed main 4.4.0-1095.106

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.4.0-1088.99 2019-07-04 17:09:07 UTC

 linux-aws (4.4.0-1088.99) xenial; urgency=medium
 .
   * linux-aws: 4.4.0-1088.99 -proposed tracker (LP: #1834908)
 .
   * hibernation support for linux-aws (LP: #1831940)
     - UBUNTU SAUCE [aws]: block: xen-blkfront: consider new dom0 features on
       restore
     - UBUNTU SAUCE [aws]: ACPICA: Enable sleep button on ACPI legacy wake
     - UBUNTU SAUCE [aws]: xen: restore pirqs on resume from hibernation.
     - UBUNTU SAUCE [aws]: xen: Only restore the ACPI SCI interrupt in
       xen_restore_pirqs.
     - radix-tree: delete radix_tree_locate_item()
     - mm: rid swapoff of quadratic complexity
     - sched/wait: Fix abort_exclusive_wait(), it should pass TASK_NORMAL to
       wake_up()
     - sched/wait: Avoid abort_exclusive_wait() in ___wait_event()
     - sched/wait: Avoid abort_exclusive_wait() in __wait_on_bit_lock()
     - sched/wait: Introduce init_wait_entry()
     - sched/wait: Standardize wait_bit_queue naming
     - sched/wait: Introduce wait_var_event()
     - mm: swapoff: shmem_unuse() stop eviction without igrab()
     - UBUNTU SAUCE [aws]: mm: aggressive swapoff
     - UBUNTU SAUCE [aws]: PM / hibernate: make sure pm_async is always disabled
     - NVMe: Allow request merges
     - PM / hibernate: Do not free preallocated safe pages during image restore
     - PM / hibernate: Recycle safe pages after image restoration
     - PM / hibernate: Simplify mark_unsafe_pages()
     - [Config] aws: disable CONFIG_TRANSPARENT_HUGEPAGE_ALWAYS
     - UBUNTU SAUCE [aws] PM / hibernate: set image_size to total RAM size by
       default
     - UBUNTU SAUCE [aws] PM / hibernate: reduce memory pressure during image
       writing
     - UBUNTU SAUCE [aws] mm, page_alloc: disable fair zone allocation policy on
       hibernate

Source diff to previous version
1831940 hibernation support for linux-aws

Version: 4.4.0-1087.98 2019-06-26 08:09:08 UTC

 linux-aws (4.4.0-1087.98) xenial; urgency=medium
 .
   * linux-aws: 4.4.0-1087.98 -proposed tracker (LP: #1834020)
 .
   [ Ubuntu: 4.4.0-154.181 ]
 .
   * linux: 4.4.0-154.181 -proposed tracker (LP: #1834030)
   * CVE-2019-11478
     - tcp: refine memory limit test in tcp_fragment()
   * CVE-2019-11479
     - SAUCE: tcp: add tcp_min_snd_mss sysctl
     - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()

Source diff to previous version
CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling cer
CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...

Version: 4.4.0-1086.97 2019-06-19 11:07:29 UTC

 linux-aws (4.4.0-1086.97) xenial; urgency=medium
 .
   * linux-aws: 4.4.0-1086.97 -proposed tracker (LP: #1832582)
 .
   [ Ubuntu: 4.4.0-152.179 ]
 .
   * linux: 4.4.0-152.179 -proposed tracker (LP: #1832593)
   * CVE-2019-11479
     - SAUCE: tcp: add tcp_min_snd_mss sysctl
     - SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
   * 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue (LP: #1824687)
     - SAUCE: ipv6: frags: fix skb extraction in ip6_expire_frag_queue()
   * [Xenial] Customer can not SSH to Linux VM due to "VSC State Unhealthy"
     (LP: #1826416)
     - vmbus: fix missing signaling in hv_signal_on_read()
   * Xenial update: 4.4.180 upstream stable release (LP: #1830176)
     - kbuild: simplify ld-option implementation
     - KVM: fail KVM_SET_VCPU_EVENTS with invalid exception number
     - cifs: do not attempt cifs operation on smb2+ rename error
     - MIPS: scall64-o32: Fix indirect syscall number load
     - trace: Fix preempt_enable_no_resched() abuse
     - sched/numa: Fix a possible divide-by-zero
     - ceph: ensure d_name stability in ceph_dentry_hash()
     - ceph: fix ci->i_head_snapc leak
     - nfsd: Don't release the callback slot unless it was actually held
     - sunrpc: don't mark uninitialised items as VALID.
     - USB: Add new USB LPM helpers
     - USB: Consolidate LPM checks to avoid enabling LPM twice
     - powerpc/xmon: Add RFI flush related fields to paca dump
     - powerpc/64s: Improve RFI L1-D cache flush fallback
     - powerpc/64s: Fix section mismatch warnings from setup_rfi_flush()
     - Revert "UBUNTU: SAUCE: powerpc/64s: Add support for a store forwarding
       barrier at kernel entry/exit"
     - powerpc/64s: Add support for a store forwarding barrier at kernel entry/exit
     - powerpc/64s: Add barrier_nospec
     - powerpc/64s: Add support for ori barrier_nospec patching
     - powerpc/64s: Patch barrier_nospec in modules
     - powerpc/64s: Enable barrier_nospec based on firmware settings
     - powerpc/64: Use barrier_nospec in syscall entry
     - powerpc: Use barrier_nospec in copy_from_user()
     - powerpc/64s: Enhance the information in cpu_show_spectre_v1()
     - powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
     - powerpc/64: Disable the speculation barrier from the command line
     - powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
     - powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
     - powerpc/64: Call setup_barrier_nospec() from setup_arch()
     - powerpc/64: Make meltdown reporting Book3S 64 specific
     - powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E
     - powerpc/asm: Add a patch_site macro & helpers for patching instructions
     - powerpc/64s: Add new security feature flags for count cache flush
     - powerpc/64s: Add support for software count cache flush
     - powerpc/pseries: Query hypervisor for count cache flush settings
     - powerpc/powernv: Query firmware for count cache flush settings
     - powerpc: Avoid code patching freed init sections
     - powerpc/fsl: Add infrastructure to fixup branch predictor flush
     - powerpc/fsl: Add macro to flush the branch predictor
     - powerpc/fsl: Fix spectre_v2 mitigations reporting
     - powerpc/fsl: Add nospectre_v2 command line argument
     - powerpc/fsl: Flush the branch predictor at each kernel entry (64bit)
     - powerpc/fsl: Update Spectre v2 reporting
     - powerpc/security: Fix spectre_v2 reporting
     - powerpc/fsl: Fix the flush of branch predictor.
     - tipc: handle the err returned from cmd header function
     - slip: make slhc_free() silently accept an error pointer
     - intel_th: gth: Fix an off-by-one in output unassigning
     - fs/proc/proc_sysctl.c: Fix a NULL pointer dereference
     - NFS: Forbid setting AF_INET6 to "struct sockaddr_in"->sin_family.
     - netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON
     - tipc: check bearer name with right length in tipc_nl_compat_bearer_enable
     - tipc: check link name with right length in tipc_nl_compat_link_set
     - bpf: reject wrong sized filters earlier
     - Revert "block/loop: Use global lock for ioctl() operation."
     - ipv4: add sanity checks in ipv4_link_failure()
     - team: fix possible recursive locking when add slaves
     - net: stmmac: move stmmac_check_ether_addr() to driver probe
     - ipv4: set the tcp_min_rtt_wlen range from 0 to one day
     - powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used
     - powerpc/fsl: Flush branch predictor when entering KVM
     - powerpc/fsl: Emulate SPRN_BUCSR register
     - powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit)
     - powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms
     - powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup'
     - powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg
     - Documentation: Add nospectre_v1 parameter
     - usbnet: ipheth: prevent TX queue timeouts when device not ready
     - usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set
     - qlcnic: Avoid potential NULL pointer dereference
     - netfilter: bridge: set skb transport_header before entering
       NF_INET_PRE_ROUTING
     - sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init()
     - usb: gadget: net2280: Fix overrun of OUT messages
     - usb: gadget: net2280: Fix net2280_dequeue()
     - usb: gadget: net2272: Fix net2272_dequeue()
     - ARM: dts: pfla02: increase phy reset duration
     - net: ks8851: Dequeue RX packets explicitly
     - net: ks8851: Reassert reset pin if chip ID check fails
     - net: ks8851: Delay requesting IRQ until opened
     - net: ks8851: Set initial carrier state to down
     - net: xilinx: fix possible object reference leak
     - net: ibm: fix possible object reference leak
     - net: ethernet: ti: fix possible object reference leak
     - scsi: qla4xxx: fix a potential NUL

Source diff to previous version
1824687 4.4.0-145-generic Kernel Panic ip6_expire_frag_queue
1826416 [Xenial] Customer can not SSH to Linux VM due to \
1830176 Xenial update: 4.4.180 upstream stable release
CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...
CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling
CVE-2018-12127 MLPDS Microarchitectural Load Port Data Sampling
CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling
CVE-2019-11091 MDSUM Microarchitectural Data Sampling Uncacheable Memory

Version: 4.4.0-1084.94 2019-05-17 15:09:02 UTC

 linux-aws (4.4.0-1084.94) xenial; urgency=medium
 .
   * linux-aws: 4.4.0-1084.94 -proposed tracker (LP: #1829193)
 .
   * Disco update: 5.0.8 upstream stable release (LP: #1828415)
     - [Config] aws: set CONFIG_LDISC_AUTOLOAD=y
     - [Config] aws: remove CONFIG_R3964
 .
   [ Ubuntu: 4.4.0-149.175 ]
 .
   * linux: 4.4.0-149.175 -proposed tracker (LP: #1829209)
   * disable a.out support (LP: #1818552)
     - [Config] Disable a.out support
   * autopkgtests run too often, too much and don't skip enough (LP: #1823056)
     - [Debian] Set +x on rebuild testcase.
     - [Debian] Skip rebuild test, for regression-suite deps.
     - [Debian] Make ubuntu-regression-suite skippable on unbootable kernels.
     - [Debian] make rebuild use skippable error codes when skipping.
     - [Debian] Only run regression-suite, if requested to.
   * Xenial update: 4.4.179 upstream stable release (LP: #1828420)
     - arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug signals
     - arm64: debug: Ensure debug handlers check triggering exception level
     - ext4: cleanup bh release code in ext4_ind_remove_space()
     - lib/int_sqrt: optimize initial value compute
     - tty/serial: atmel: Add is_half_duplex helper
     - mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified
     - i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
     - Bluetooth: Fix decrementing reference count twice in releasing socket
     - tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped
     - CIFS: fix POSIX lock leak and invalid ptr deref
     - h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux-
     - tracing: kdb: Fix ftdump to not sleep
     - gpio: gpio-omap: fix level interrupt idling
     - sysctl: handle overflow for file-max
     - enic: fix build warning without CONFIG_CPUMASK_OFFSTACK
     - mm/cma.c: cma_declare_contiguous: correct err handling
     - mm/page_ext.c: fix an imbalance with kmemleak
     - mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512!
     - mm/slab.c: kmemleak no scan alien caches
     - ocfs2: fix a panic problem caused by o2cb_ctl
     - f2fs: do not use mutex lock in atomic context
     - fs/file.c: initialize init_files.resize_wait
     - cifs: use correct format characters
     - dm thin: add sanity checks to thin-pool and external snapshot creation
     - cifs: Fix NULL pointer dereference of devname
     - fs: fix guard_bio_eod to check for real EOD errors
     - tools lib traceevent: Fix buffer overflow in arg_eval
     - usb: chipidea: Grab the (legacy) USB PHY by phandle first
     - scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c
     - coresight: etm4x: Add support to enable ETMv4.2
     - ARM: 8840/1: use a raw_spinlock_t in unwind
     - mmc: omap: fix the maximum timeout setting
     - e1000e: Fix -Wformat-truncation warnings
     - IB/mlx4: Increase the timeout for CM cache
     - scsi: megaraid_sas: return error when create DMA pool failed
     - perf test: Fix failure of 'evsel-tp-sched' test on s390
     - SoC: imx-sgtl5000: add missing put_device()
     - media: sh_veu: Correct return type for mem2mem buffer helpers
     - media: s5p-jpeg: Correct return type for mem2mem buffer helpers
     - media: s5p-g2d: Correct return type for mem2mem buffer helpers
     - media: mx2_emmaprp: Correct return type for mem2mem buffer helpers
     - leds: lp55xx: fix null deref on firmware load failure
     - kprobes: Prohibit probing on bsearch()
     - ARM: 8833/1: Ensure that NEON code always compiles with Clang
     - ALSA: PCM: check if ops are defined before suspending PCM
     - bcache: fix input overflow to cache set sysfs file io_error_halflife
     - bcache: fix input overflow to sequential_cutoff
     - bcache: improve sysfs_strtoul_clamp()
     - fbdev: fbmem: fix memory access if logo is bigger than the screen
     - cdrom: Fix race condition in cdrom_sysctl_register
     - ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe
     - soc: qcom: gsbi: Fix error handling in gsbi_probe()
     - mt7601u: bump supported EEPROM version
     - ARM: avoid Cortex-A9 livelock on tight dmb loops
     - tty: increase the default flip buffer limit to 2*640K
     - media: mt9m111: set initial frame size other than 0x0
     - hwrng: virtio - Avoid repeated init of completion
     - soc/tegra: fuse: Fix illegal free of IO base address
     - hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable
     - dmaengine: imx-dma: fix warning comparison of distinct pointer types
     - netfilter: physdev: relax br_netfilter dependency
     - media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration
     - regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting
     - wlcore: Fix memory leak in case wl12xx_fetch_firmware failure
     - x86/build: Mark per-CPU symbols as absolute explicitly for LLD
     - dmaengine: tegra: avoid overflow of byte tracking
     - drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers
     - binfmt_elf: switch to new creds when switching to new mm
     - kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD
     - x86/build: Specify elf_i386 linker emulation explicitly for i386 objects
     - x86: vdso: Use $LD instead of $CC to link
     - x86/vdso: Drop implicit common-page-size linker flag
     - lib/string.c: implement a basic bcmp
     - tty: mark Siemens R3964 line discipline as BROKEN
     - [Config]: remove CONFIG_R3964
     - [Config]: add CONFIG_LDISC_AUTOLOAD=y
     - tty: ldisc: add sysctl to prevent autoloading of ldiscs
     - ipv6: Fix dangling pointer when ipv6 fragment
     - ipv6: sit: reset ip header pointer in ipip6_rcv
     - net: rds: force to destroy connection if t_sock is NULL in
       rds_tcp_kill_sock().
     - qmi_wwan: add Olicard 600
     - sctp: initialize _pad of sockaddr_in before copying to user memory
     - tcp: Ensure DCTCP reacts to losses
     - netns: provide pure entropy for net_hash_mi

Source diff to previous version
1828415 Disco update: 5.0.8 upstream stable release
1818552 disable a.out support
1823056 autopkgtests run too often, too much and don't skip enough
1828420 Xenial update: 4.4.179 upstream stable release
1826212 Xenial update: 4.4.178 upstream stable release
1825780 Kprobe event string type argument failed in ftrace from ubuntu_kernel_selftests on B/C i386
1825777 False positive test result in run_netsocktests from net in ubuntu_kernel_selftest

Version: 4.4.0-1082.92 2019-04-24 18:07:41 UTC

 linux-aws (4.4.0-1082.92) xenial; urgency=medium
 .
   * linux-aws: 4.4.0-1082.92 -proposed tracker (LP: #1826024)
 .
   * Packaging resync (LP: #1786013)
     - [Packaging] resync git-ubuntu-log
 .
   * Please ship modules nvme, nvmem_core as built-in (LP: #1823045)
     - aws: [Config] make CONFIG_BLK_DEV_NVME, NVMEM builtin
 .
   [ Ubuntu: 4.4.0-147.173 ]
 .
   * linux: 4.4.0-147.173 -proposed tracker (LP: #1826036)
   * Packaging resync (LP: #1786013)
     - [Packaging] resync git-ubuntu-log
   * Xenial: Sync to upstream v4.9 (Spectre) (LP: #1820872)
     - SAUCE: cpu/hotplug: Fix Documentation/kernel-parameters.txt
     - SAUCE: Fix typo in Documentation/kernel-parameters.txt
     - SAUCE: x86: Move hunks and sync to upstream stable 4.9
     - Revert "module: Add retpoline tag to VERMAGIC"
   * CVE-2017-5753
     - posix-timers: Protect posix clock array access against speculation
     - arm64: fix possible spectre-v1 in ptrace_hbp_get_event()
     - sched/autogroup: Fix possible Spectre-v1 indexing for sched_prio_to_weight[]
     - media: dvb_ca_en50221: prevent using slot_info for Spectre attacs
     - s390/keyboard: sanitize array index in do_kdsk_ioctl
     - arm64: fix possible spectre-v1 write in ptrace_hbp_set_event()
     - pktcdvd: Fix possible Spectre-v1 for pkt_devs
     - net: socket: Fix potential spectre v1 gadget in sock_is_registered
     - net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd()
     - hwmon: (nct6775) Fix potential Spectre v1
     - mac80211_hwsim: Fix possible Spectre-v1 for hwsim_world_regdom_custom
     - nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT
     - ipmi: msghandler: Fix potential Spectre v1 vulnerabilities
     - powerpc/ptrace: Mitigate potential Spectre v1
     - cfg80211: prevent speculation on cfg80211_classify8021d() return
     - ALSA: rawmidi: Fix potential Spectre v1 vulnerability
     - ALSA: seq: oss: Fix Spectre v1 vulnerability
   * CVE-2019-3874
     - sctp: fix the issue that a __u16 variable may overflow in sctp_ulpq_renege
     - sctp: use sk_wmem_queued to check for writable space
     - sctp: implement memory accounting on tx path
     - sctp: implement memory accounting on rx path
   * Kprobe event argument syntax in ftrace from ubuntu_kernel_selftests failed
     on B PowerPC (LP: #1812809)
     - selftests/ftrace: Add ppc support for kprobe args tests
   * CVE-2019-3882
     - vfio/type1: Limit DMA mappings per container
   * Intel I210 Ethernet card not working after hotplug [8086:1533]
     (LP: #1818490)
     - igb: Fix WARN_ONCE on runtime suspend
   * TSC clocksource not available in nested guests (LP: #1822821)
     - x86/tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag
     - kvmclock: fix TSC calibration for nested guests
   * Remove btrfs module after a failed fallocate attempt will cause error on 4.4
     i386 (LP: #1822579)
     - Btrfs: fix extent map leak during fallocate error path
   * systemd cause kernel trace "BUG: unable to handle kernel paging request at
     6db23a14" on Cosmic i386 (LP: #1813244) // systemd cause kernel trace "BUG:
     unable to handle kernel paging request at 6db23a14" on Cosmic i386
     (LP: #1813244)
     - openvswitch: fix flow actions reallocation

1786013 Packaging resync
1823045 Please ship modules nvme, nvmem_core as built-in
1820872 Xenial: Sync to upstream v4.9 (Spectre)
1812809 Kprobe event argument syntax in ftrace from ubuntu_kernel_selftests failed on B PowerPC
1818490 Intel I210 Ethernet card not working after hotplug [8086:1533]
1822821 TSC clocksource not available in nested guests
1822579 Remove btrfs module after a failed fallocate attempt will cause error on 4.4 i386
1813244 systemd cause kernel trace \
CVE-2017-5753 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker wi
CVE-2019-3874 The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of
CVE-2019-3882 DoS through vfio/type1 DMA mappings



About   -   Send Feedback to @ubuntu_updates